Trufflepig Logo


In­ci­dent re­sponse with speed and pre­ci­sion ben­e­fits enor­mously.

In the wake of in­creas­ing cy­ber­at­tacks, con­fi­dently mak­ing the proper han­dling of the in­ci­dent is val­ued crit­i­cal, and re­cov­er­ing op­er­a­tions has never been more es­sen­tial or costly.

A cy­ber­at­tack in­ci­dent can be an over­whelm­ing ex­pe­ri­ence, user dis­rup­tion, data theft, in­fected end­points, ex­tor­tion and even out­ages that cause mas­sive in­ter­rup­tion on daily busi­ness. All busi­nesses try to avoid this dark day ex­pe­ri­ence.

Time is the essence - Truf­flepig Nexus, in­tel­li­gence-dri­ven
analy­sis, de­liv­ers the in­for­ma­tion fast.

Us­ing Truf­flepig Nexus for mem­ory analy­sis can re­sult in faster in­ci­dent re­sponse. In­ci­dent re­spon­ders can:

Ben­e­fit from the pos­si­bil­ity to de­tect and re­verse en­gi­neer mal­ware

Vi­su­alise net­work sock­ets, URLs and IP ad­dresses

Open files, com­puter-gen­er­ated con­tent, pass­words, user mis­con­duct, caches, clip­boards, en­cryp­tion keys, win­dows reg­istry keys and logs

Ad­van­tages of us­ing Nexus

Truf­flepig Nexus gives or­gan­i­sa­tions the pos­si­bil­ity to study a run­ning sys­tem con­fig­u­ra­tion and iden­tify the sys­tem in­con­sis­ten­cies - By­pass pack­ers, rootk­its (in­clud­ing ker­nel mode), bi­nary ob­fus­ca­tors and other hid­ing tools.


Find­ing all the rel­e­vant data and se­cur­ing it faster than any­thing else on the mar­ket has been the main fo­cus.


You can view all analy­sis re­sults in a sin­gle in­tu­itive user in­ter­face, and the in­ves­ti­ga­tion spe­cial­ist can then sup­ple­ment these find­ings with case-re­lated in­for­ma­tion.


It is vi­tal to col­lect ev­i­dence, and in mem­ory, or­gan­i­sa­tions can find proof that can­not be found any­where else, like; Chat threads, mem­ory-only mal­ware, and in­ter­net ac­tiv­i­ties, to men­tion a few.